[GLSA-202307-01] OpenSSH: Remote Code Execution

Severity High
Affected Packages 1
Unaffected Packages 1
CVEs 3

Multiple vulnerbilities have been discovered in OpenSSH, the worst of which could result in remote code execution.

Background
OpenSSH is a free application suite consisting of server and clients that replace tools like telnet, rlogin, rcp and ftp with more secure versions offering additional functionality.

Description
Multiple vulnerabilities have been discovered in OpenSSH. Please review the CVE identifiers referenced below for details.

Impact
Please review the CVE identifiers referenced below for details.

Workaround
CVE-2023-38408 can be worked around by avoiding connecting to untrusted servers with an SSH agent.

Resolution
All OpenSSH users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/openssh-9.3_p2"

Package Affected Version
pkg:ebuild/net-misc/openssh?distro=gentoo < 9.3_p2
Package Unaffected Version
pkg:ebuild/net-misc/openssh?distro=gentoo >= 9.3_p2
Source # ID Name URL
CVE CVE-2023-25136 CVE-2023-25136 https://nvd.nist.gov/vuln/detail/CVE-2023-25136
CVE CVE-2023-28531 CVE-2023-28531 https://nvd.nist.gov/vuln/detail/CVE-2023-28531
CVE CVE-2023-38408 CVE-2023-38408 https://nvd.nist.gov/vuln/detail/CVE-2023-38408
Bugzilla 892936 Bugzilla #892936 https://bugs.gentoo.org/show_bug.cgi?id=892936
Bugzilla 905299 Bugzilla #905299 https://bugs.gentoo.org/show_bug.cgi?id=905299
Bugzilla 910553 Bugzilla #910553 https://bugs.gentoo.org/show_bug.cgi?id=910553
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:ebuild/net-misc/openssh?distro=gentoo net-misc openssh < 9.3_p2 gentoo
Unaffected pkg:ebuild/net-misc/openssh?distro=gentoo net-misc openssh >= 9.3_p2 gentoo
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...